This document discusses the importance of physical security to protect against attackers. It notes that while many companies focus on network security, physical theft or access can also compromise data. There are two types of attackers - those outside and inside an organization. Guidelines are provided to restrict physical access for outsiders through barriers, checkpoints, and patrols. For insiders, access controls like badge programs, guest monitoring, and equipment locking are recommended. Server rooms should have heightened security like cameras and limited authorized personnel to protect highly sensitive systems and data.